Risk
6/14/2010
11:53 PM
Connect Directly
RSS
E-Mail
50%
50%

Ipswitch Acquires MessageWay In Merger Of Managed File Transfer Vendors

Acquisition will pave the way for more secure application-to-application communications, partners say

Ipswitch, a maker of secure, managed file transfer products and services, on Tuesday will announce it has acquired MessageWay Solutions, a provider of managed file transfer and business integration solutions.

Terms of the deal were not disclosed.

With the addition of MessageWay to its product family, Ipswitch will provide a wide range of secure file transfer services and capabilities, including of advanced analytics, enterprisewide monitoring, and high-performance data translation and transformation for EDI, ERP, and a variety of other message formats, the companies said.

"When people in the industry talk about security, one of the things that they don't often mention is that about 80 percent of the exchanges that go on between companies are exchanges of files between applications, not between people sitting at a desk typing at a computer," says Greg Faubert, president of MessageWay. "This is an area that's becoming more important all the time."

"The file transfer market is changing, not only in the volume and size of messages, but in the way they are handled," says Gary Shottes, president of Ipswitch. "The worlds of managed file transfer, EDI, and middleware, which have typically been handled by different vendors, are converging. We think we'll be in a position to take market share away from all of those more focused players, by offering solutions that provide a more integrated approach." The need for managed file transfer is increasing as organizations look for ways to meet industry and regulatory requirements, such as SOX, PCI, FISMA, and HIPAA, the executives said. Many enterprises need a better way to show a "chain of custody" on file transfers, proving to auditors that data is safe as it travels between partners.

"What we offer is the ability to exchange files securely through the DMZ without the file ever landing on disk," Faubert says. "Companies can submit files or retrieve files through an open protocol, but without the file ever residing in the red zone.

"Once the data gets to its destination, it's encrypted and housed in a secure database," Faubert explains. "The only way for an attacker to get into those files would be for them to have access to the physical disk, all of the encryption keys, and a copy of our software."

Ipswitch expects its combined offerings to get traction in industries where secure file transfer is required, such as financial services, government, and healthcare.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.